Skip to main content

Research Repository

Advanced Search

Outputs (273)

A critical analysis of e-government evaluation models at national and local municipal levels (2015)
Journal Article
Zahran, D. I., Al-Nuaim, H. A., Rutter, M. J., & Benyon, D. (2015). A critical analysis of e-government evaluation models at national and local municipal levels. Electronic Journal of e-Government, 13, 28-42

The importance of e-government models lies in their offering a basis to measure and guide e-government. There is still no agreement on how to assess a government online. Most of the e-government models are not based on research, nor are they validate... Read More about A critical analysis of e-government evaluation models at national and local municipal levels.

Making co-op work: An exploration of student attitudes to co-op programs (2015)
Presentation / Conference Contribution
Smith, S., Berg, T., & Smith, C. (2015). Making co-op work: An exploration of student attitudes to co-op programs. In Frontiers in Education Conference (FIE), 2015. 32614 2015. IEEE (1-6). https://doi.org/10.1109/fie.2015.7344173

Engineering and computing at university both have a long tradition of co-operative education which plays a vital role in developing students' applied skills and giving confidence to both students and potential employers. Co-op education refers to rel... Read More about Making co-op work: An exploration of student attitudes to co-op programs.

Evaluation of TFTP DDoS amplification attack (2015)
Journal Article
Sieklik, B., Macfarlane, R., & Buchanan, W. J. (2016). Evaluation of TFTP DDoS amplification attack. Computers and Security, 57, 67-92. https://doi.org/10.1016/j.cose.2015.09.006

Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these s... Read More about Evaluation of TFTP DDoS amplification attack.

Maths and Mobile Technologies: Student Attitudes and Perceptions (2015)
Presentation / Conference Contribution
Fabian, K. (2015). Maths and Mobile Technologies: Student Attitudes and Perceptions. In Proceedings of the 14th European Conference on Elearning (696)

Approaches that advocate the contextualized teaching of mathematics have been around for years but the ubiquity of mobile devices together with the potential to bridge classroom learning to real-world has added a new angle to contextualizing mathemat... Read More about Maths and Mobile Technologies: Student Attitudes and Perceptions.

Towards an augmented authenticator in the Cloud (2015)
Presentation / Conference Contribution
Pitropakis, N., Yfantopoulos, N., Geneiatakis, D., & Lambrinoudakis, C. (2015). Towards an augmented authenticator in the Cloud. In 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). https://doi.org/10.1109/isspit

Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy p... Read More about Towards an augmented authenticator in the Cloud.

Automatically Detecting Fallacies in System Safety Arguments (2015)
Presentation / Conference Contribution
Wells, S., Yuan, T., Manandhar, S., & Kelly, T. (2015, October). Automatically Detecting Fallacies in System Safety Arguments. Paper presented at 15th International Workshop on Computational Models of Natural Argument(CMNA15), Bertinoro, Italy

Safety cases play a significant role in the development of safety-critical systems. The key components in a safety case are safety arguments, that are designated to demonstrate that the system is acceptably safe. Inappropriate reasoning with safety a... Read More about Automatically Detecting Fallacies in System Safety Arguments.

Introducing ALIAS (2015)
Presentation / Conference Contribution
Wells, S., & LaGreca, R. (2015, October). Introducing ALIAS. Paper presented at 15th International Workshop on Computation Models of Natural Argument

ALIAS is a Python library for constructing, manipulating, storing, visualising, and converting argumentation structues. It is available with full source code under a copyleft license and aims to become a Swiss Army Knife for working with arguments in... Read More about Introducing ALIAS.

Inspired counter based broadcasting in dynamic source routing protocol. (2015)
Presentation / Conference Contribution
Yassein, M. B., & Al-Dubai, A. (2015, October). Inspired counter based broadcasting in dynamic source routing protocol. Paper presented at 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2015)

The broadcast storm problem is one of the most challenging issues in Mobile ad Hoc Networks (MANETs). However, it is still a challenging problem despite the great deal of related works and existing solutions. Dynamic Source Routing Protocol (DSR)... Read More about Inspired counter based broadcasting in dynamic source routing protocol..

Performance evaluation of RPL objective functions. (2015)
Presentation / Conference Contribution
Altwassi, H., Qasem, M., Yassein, M. B., & Al-Dubai, A. (2015, October). Performance evaluation of RPL objective functions. Paper presented at International Workshop on Internet of Things and Smart Spaces (IoT-Smart-2015): Applications, Challenges and Fut

IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard for Wireless Sensors Networks. RPL uses two different ‘objective functions’ (OFs), namely Minimum Rank with Hysteresis Objective Function (MRHOF); and Objective Function Zero... Read More about Performance evaluation of RPL objective functions..

The limits of pretending (2015)
Journal Article
Turner, P., Hetherington, R., Turner, S., & Kosek, M. (2015). The limits of pretending. Digital Creativity, 26(3-4), 304-317. https://doi.org/10.1080/14626268.2015.1091778

We propose that pretending is a cognitive faculty which enables us to create and immerse ourselves in possible worlds. These worlds range from the veridical to the fantastic and are frequently realised as stories varying from the fictional to the sci... Read More about The limits of pretending.